CN109543390B - Information security management method and system - Google Patents

Information security management method and system Download PDF

Info

Publication number
CN109543390B
CN109543390B CN201811590510.3A CN201811590510A CN109543390B CN 109543390 B CN109543390 B CN 109543390B CN 201811590510 A CN201811590510 A CN 201811590510A CN 109543390 B CN109543390 B CN 109543390B
Authority
CN
China
Prior art keywords
user
unlocking
stored
module
electronic equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811590510.3A
Other languages
Chinese (zh)
Other versions
CN109543390A (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinrun Ark Technology Co.,Ltd.
Original Assignee
Jinrun Ark Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinrun Ark Technology Co ltd filed Critical Jinrun Ark Technology Co ltd
Priority to CN201811590510.3A priority Critical patent/CN109543390B/en
Publication of CN109543390A publication Critical patent/CN109543390A/en
Application granted granted Critical
Publication of CN109543390B publication Critical patent/CN109543390B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

An information security management method and system, the method comprising: displaying and inputting an unlocking mode on a screen; if the verification is passed, the information is set and managed, and if the verification is failed, the information is continuously input and verified; presenting content when a privacy-related application in an electronic device is launched; selecting and setting contents to be stored for peeping and leakage prevention; carrying out format conversion on the contents to be stored for peeping prevention and leakage prevention and storing the contents; when a display is attempted, it is displayed on the screen by calling. The method and the system can carry out information setting and scientific management on the electronic equipment, protect the information security of an owner and avoid the leakage of personal information, privacy information, friend and relativity information and contact data; facilitating the electronic device being able to be returned after being lost; parameters can be dynamically fine-tuned according to the use habits of users, and the unlocking flexibility and the user experience are improved; the method can ensure that the crack entrants cannot restore the stored data, effectively improve the data processing efficiency and improve the user experience.

Description

Information security management method and system
Technical Field
The present invention relates to the field of electrical data processing, and more particularly, to an information security management system and method.
Background
With the rapid development of economic society, electronic devices are increasingly used in people's lives, such as communication tools, social contact tools, mobile internet access and information acquisition tools, entertainment tools, image and video photographing and storing tools, information recording tools, internet shopping and mobile payment tools, and the like. Therefore, the electronic equipment becomes a helper of people's life, and greatly improves and enriches people's material and mental life. However, the security problem of electronic devices is becoming more and more prominent, just because the role of electronic devices is becoming more and more prominent. For example, when the electronic device is used by a non-owner, private information in the electronic device may be leaked, or economic loss of the owner may be caused. Such as the following scenarios: the mobile terminal of the owner is unfortunately lost, so that the picked people can obtain the payment treasure or the WeChat wallet of the owner or the third party payment account number, thereby bringing economic loss to the owner, particularly when the owner sets password-free payment or password-free payment for convenience, the picked people can realize transfer without blowing the trouble, and huge financial loss is brought to the owner. Alternatively, the owner's mobile terminal is acquired by a friend and viewed in an application, which may result in personal privacy disclosure or embarrassment, for example, an incumbent heterogeneous friend of the owner may undoubtedly browse pictures, chat records, communication records, logos, etc. of a former heterogeneous friend of the owner, resulting in a total dilemma of the owner. As another example, the non-owner may browse other user information in the owner's mobile terminal, such as names, work units, phone numbers, emails, and communication records of friends and relatives, so that the information can be used to impersonate the owner, sell personal information, or perform precise marketing, which may have a negative reputation or adverse effect on the owner. Therefore, there is a need for information setting and scientific management of electronic devices, so as to better protect the information security of owners and avoid the leakage of personal information, privacy information, friend and friend information and contact data. However, in the prior art, the screen is often locked for the electronic device, so that the electronic device is unlocked by inputting a password, inputting biometric information, inputting a gesture and sliding or generating a pattern, and the security level is not high, for example, a non-owner may try to input the password continuously, or infer an unlocking password according to a scratch on the screen of the electronic device, or obtain the fingerprint of the owner by an illegal means and then unlock the electronic device by manufacturing a fingerprint mold through reverse engineering; in addition, even after unlocking, information in the electronic device cannot be classified or set, so that a non-owner sees contents which cannot be seen; in addition, if the electronic equipment is lost once, the electronic equipment is often difficult to return, so the prior art lacks relevant measures on the return of the lost electronic equipment and the leakage prevention guarantee of the content of the lost electronic equipment.
Based on this, it is necessary to invent an information security management method and system capable of solving the above problems.
Disclosure of Invention
One of the objectives of the present invention is to provide an information security management method and system, which can perform information setting and scientific management on electronic devices, so as to better protect the information security of owners, and avoid leakage of personal information, private information, friend and friend information, and contact data; and facilitate the electronic device being returned after being lost; parameters can be dynamically fine-tuned according to the use habits of users, and the unlocking flexibility and the user experience are improved; the method can ensure that the crack entrants cannot restore the stored data, effectively improve the data processing efficiency and improve the user experience.
The technical scheme adopted by the invention to solve the technical problems is as follows: an information security management method, comprising: when the electronic equipment is triggered, displaying an unlocking mode on a screen; inputting by a user according to an unlocking mode; if the verification is passed, setting and managing the information of the electronic equipment, and if the verification is failed, continuing inputting and verifying until the verification is passed or the preset number of times is reached; when an application program related to privacy in the electronic equipment is started after the user is authenticated, the application program presents content; the user selects and sets the contents which need to be stored for peeping and leakage prevention; carrying out format conversion on the contents to be stored for peeping prevention and leakage prevention and storing the contents; when the user clicks on the icon to attempt display, it is displayed on the screen by calling the content stored for peep-prevention and disclosure.
In one embodiment, the method further comprises: step 1, when the electronic equipment is triggered, displaying a first unlocking mode on a screen; step 2, the user inputs according to the first unlocking mode, if the verification is passed, the step 7 is carried out, otherwise, the step 3 is carried out; step 3, displaying a second unlocking mode on a screen; step 4, the user inputs according to the second unlocking mode, if the verification is passed, the step 7 is carried out, otherwise, the step 5 is carried out; step 5, repeating the step 4, and if the failure times of the second unlocking mode of the user reach a first threshold value, pausing the unlocking for a period of time; step 6, when an application program related to privacy in the electronic equipment is started after the user is authenticated, the application program presents content; and 7: the user selects and sets the contents which need to be stored for peeping and leakage prevention, and selects the contents which are stored after simple transformation or encrypted transformation; and 8: if the content is stored after simple conversion, performing format conversion on the content to be stored for peeping prevention and leakage prevention and storing the content, displaying an icon above a screen to prompt that the content stored for peeping prevention and leakage prevention exists when the context information of the content is displayed, and executing the step 10; step 9, if the content is stored after encryption conversion, format conversion and partial conversion are carried out on the content to be stored for peep prevention and leakage prevention, when the context information of the content is displayed, an icon is displayed above a screen to prompt that the content stored for peep prevention and leakage prevention exists, and step 10 is executed; when the user clicks on the icon to attempt display, the application prompts the user to enter a password, and after verification, invokes the stored peep-proof and divulged content for display on the screen, step 10.
In one embodiment, in step 5, in the step 4, if the number of times of the second unlocking mode failure of the user reaches the first threshold, after the unlocking is suspended for a period of time, an image of the user who failed in the unlocking is photographed through a camera lens of the electronic device and is transmitted to a predetermined destination and/or displayed on a screen.
In one embodiment, in step 8, if the content is stored after simple transformation, the content to be stored for peep-proof and leakage is formatted and stored in a designated area of the electronic device.
In one embodiment, in step 9, if the content is stored after encryption transformation, the content to be stored for peep prevention and leakage prevention is subjected to format transformation, part of the content is stored in a designated area of the electronic device, and the other part of the content is stored in a remote device.
In one embodiment, in step 10, when the user clicks on the icon to attempt display, the application prompts the user to enter a password, and after verification, calls stored peek and divulge content from a designated area of the electronic device or a designated area of the electronic device and a remote device for display on the screen.
In one embodiment, in step 10, the retrieved stored peek-protected and compromised content is deleted from the buffer when the user exits the application or browses other applications, while ensuring storage only on the designated area of the electronic device or on the designated area of the electronic device and the remote device.
In one embodiment, the first unlocking manner and the second unlocking manner are any one of password input, slide input, biometric input, and motion input.
In one embodiment, the first unlocking mode is a biometric input, wherein in step 2, the user inputting and verifying according to the first unlocking mode comprises: the electronic equipment is internally provided with a fingerprint identifier and a finger pressure sensor, when a user places a finger on the fingerprint identifier, the fingerprint identifier collects and identifies fingerprint information of the finger, compares the fingerprint information with a preset fingerprint in a preset database, and transmits a fingerprint result to a judgment module in the electronic equipment; the method comprises the steps that when a user places a finger on a fingerprint recognizer, other fingers are placed on a finger pressure sensor on a screen of the electronic equipment, the finger pressure sensor collects pressure applied by other fingers, the number of dot matrixes with pressure values larger than a second threshold value in the contact area of the finger and the screen is judged, the touch area with the applied pressure meeting requirements is calculated according to the number of the dot matrixes with the applied pressure larger than the second threshold value, whether the touch area with the applied pressure meeting requirements of the user falls into the limited preset touch area range or not is judged according to the preset touch area range limited between a third threshold value and a fourth threshold value in a historical record database, and the result of whether the touch area falls into the limited preset touch area range or not is transmitted to a judging module in the; the judging module judges whether the fingerprint passes the verification or not according to the fingerprint result and the result of whether the fingerprint falls into the limited preset touch area range, when the fingerprint is matched with the preset fingerprint in the preset database and the touch area of which the pressure applied by the user meets the requirement falls into the limited preset touch area range, the judging module outputs the result of passing the verification to the unlocking module of the electronic equipment, otherwise, the judging module outputs the result of failing the verification to the unlocking module of the electronic equipment; in the judgment of whether the fingerprint is matched with the preset fingerprint in the preset database or not, whether the similarity ratio of the fingerprint to the preset fingerprint in the preset database is greater than a fifth threshold value or not needs to be judged, if so, the matching relationship exists, and otherwise, the matching relationship does not exist; in each verification, when the touch area with the pressure applied by the user meeting the requirement falls into a preset touch area range defined between a third threshold and a fourth threshold, after the verification, inputting the numerical value of the touch area with the pressure applied by the user meeting the requirement into a historical record database, averaging the numerical value with N records of the touch area in the historical record, and selecting a range with a certain proportion of positive and negative of an averaging result as a new third threshold and a new fourth threshold, so that fine adjustment can be performed according to the use habits of the user, the unlocking flexibility and the user experience are improved, and the information safety of the electronic equipment is ensured; and the second unlocking mode is biological characteristic identification input, wherein in the step 4, the input and verification of the user according to the second unlocking mode comprises the following steps: the electronic equipment is provided with an ambient light judging module, an eye judging module and a motion sensing module containing a gravity sensor; when entering a second unlocking mode, the ambient light judgment module judges the intensity of ambient light, if the intensity of the ambient light meets the strong ambient cursor criterion, the eye judgment module is started, and if the intensity of the ambient light meets the weak ambient cursor criterion, the motion sensing module is started, and the started selection mode is displayed on the display screen; the eye judgment module shoots a video of eye movement changes of a user through a lens of the camera, analyzes the positions of eyeballs in each frame in the video, comprehensively judges the movement changes of the eyes of the user, compares the movement change tracks of the eyes of the user with records in the eye judgment module, unlocks a screen when the matching degree is determined to meet the requirement, and informs the user of unlocking failure when the matching degree is determined not to meet the requirement; the shooting and analyzing operation is as follows: when the screen displays the eye judgment module, the image or the text on the screen prompts a user to watch a front camera of the electronic equipment and enable eyeballs to move in a specified time period, the specified distance range is kept between the image or the text and the front camera, the palm is kept to hold the electronic equipment and not shake, the distance can ensure that the camera can capture the movement of the eyeballs of the user, meanwhile, the camera starts a shooting mode, a plurality of frames in the shot video are obtained in the specified time period, the eye part is locked by analyzing a region with large gray scale change in each frame of image, the eye part is specifically scanned in the horizontal direction and the vertical direction in sequence, when the gray scale change in two adjacent pixels is judged to be larger than a seventh threshold value, the rest pixel sequences in the direction are calculated, the change of the gray scale value is drawn into a curve, when the maximum value appears, the junction of a sclera and an iris is reached, when the minimum, when the second maximum value appears, indicating that the boundary of the iris and the sclera is reached, the same operation is carried out to capture the position information and the coordinate value of the other eye in the frame image; then sequentially analyzing the positions of two pupils in adjacent frames, and drawing a moving curve of the eyes of the user according to the coordinate numerical value of each pupil in each frame of image; comparing the drawn binocular curve with records in the eye judgment module, and unlocking the screen when the matching degree of at least one of the two eyes and the records meets the requirements; and if the weak environment cursor criterion is met, starting the motion sensing module, displaying the started selection mode on a display screen, reminding a user to hold the electronic equipment and shake the electronic equipment in a certain track within a specified time period, drawing an acceleration change curve by the motion sensing module according to the change of the acceleration of the electronic equipment within the specified time period by a gravity sensor in the motion sensing module in the electronic equipment, comparing the acceleration change curve with the record in the motion sensing module, and unlocking the screen when the matching degree of the acceleration change curve and one of the recorded acceleration change curves is determined to meet the requirement.
In one embodiment, an information security management system is further disclosed, the information security management system comprising a memory, a processor, an application, a fingerprint recognizer, a determination module, a finger pressure sensor, an unlocking module, an ambient light determination module, an eye determination module, a motion sensing module, a gravity sensor, a camera, a lens, a social application, a transformation module, a global positioning system program module, an application for initiating mobile communication, a timing module, the memory comprising a program for executing the information security management method, the processor calling the program in the memory to interact with the application, the fingerprint recognizer, the determination module, the finger pressure sensor, the unlocking module, the ambient light determination module, the eye determination module, the motion sensing module, the gravity sensor, the camera, the lens, the social application, the transformation module, the eye determination module, the motion sensing module, the gravity sensor, a global positioning system program module, an application program for starting mobile communication and a timing module together execute one or more of the steps of the information security management method.
Drawings
Embodiments of the invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
fig. 1 illustrates a flow diagram of an information security management method according to an exemplary embodiment of the present invention.
Fig. 2 illustrates a block diagram of an information security management system according to an exemplary embodiment of the present invention.
Detailed Description
Before proceeding with the following detailed description, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document: the terms "include" and "comprise," as well as derivatives thereof, mean inclusion without limitation; the term "or" is inclusive, meaning and/or; the phrases "associated with," "associated with," and derivatives thereof may mean to include, be included within, with, interconnect with, contain, be included within, be connected to, or be connected with, be coupled to, or be coupled with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to, or be bound with, have properties of, etc.; while the term "controller" means any device, system or component thereof that controls at least one operation, such a device may be implemented in hardware, firmware or software, or some combination of at least two of the same. It should be noted that: the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, as those skilled in the art will understand: in many, if not most instances, such definitions apply to prior as well as future uses of such defined words and phrases.
In the following description, reference is made to the accompanying drawings that show, by way of illustration, several specific embodiments. It will be understood that: other embodiments are contemplated and may be made without departing from the scope or spirit of the present disclosure. The following detailed description is, therefore, not to be taken in a limiting sense.
Fig. 1 illustrates a flow diagram of a method for information security management, according to an exemplary embodiment of the present invention. Specifically, the method comprises the following steps:
step 1, when the electronic equipment is triggered, displaying a first unlocking mode on a screen;
step 2, the user inputs according to the first unlocking mode, if the verification is passed, the step 7 is carried out, otherwise, the step 3 is carried out;
step 3, displaying a second unlocking mode on a screen;
step 4, the user inputs according to the second unlocking mode, if the verification is passed, the step 7 is carried out, otherwise, the step 5 is carried out;
step 5, repeating the step 4, if the failure times of the second unlocking mode of the user reach a first threshold value, pausing unlocking for a period of time, shooting an image of the user with the failure of unlocking through a camera lens of the electronic equipment, and sending the image to a preset destination and/or displaying the image on a screen;
step 6, when an application program related to privacy in the electronic equipment is started after the user is authenticated, the application program presents content;
and 7: the user selects and sets the contents which need to be stored for peeping and leakage prevention, and selects the contents which are stored after simple transformation or encrypted transformation;
and 8: if the content is stored after simple conversion, performing format conversion on the content to be stored for peeping prevention and leakage prevention, storing the content to be stored for peeping prevention and leakage prevention to a designated area of the electronic equipment, displaying an icon above a screen to prompt that the content stored for peeping prevention and leakage prevention exists when the context information of the content is displayed, and executing the step 10;
step 9, if the content is stored after encryption transformation, format transformation is carried out on the content to be stored for peep prevention and leakage prevention, part of the content is stored in a designated area of the electronic equipment, the other part of the content is stored in remote equipment, when the context information of the content is displayed, an icon is displayed above a screen to prompt that the content stored for peep prevention and leakage prevention exists, and step 10 is executed;
step 10, when the user clicks the icon to try to display, the application program reminds the user to input a password, and after the password is verified, the stored peep-proof and leakage-proof content is called from the specified area of the electronic equipment or the specified area of the electronic equipment and the remote equipment so as to be displayed on a screen; and when the user exits the application or browses other applications, the recalled stored peep-proof and divulged content is deleted from the buffer, and is guaranteed to be stored only in a designated area of the electronic device or in a designated area of the electronic device and a remote device.
According to an exemplary embodiment of the present invention, the first unlocking manner and the second unlocking manner may be any one of password input, slide input, biometric input, and motion input.
According to an exemplary embodiment of the present invention, the first unlocking manner is a biometric input, wherein in step 2, the user inputting and verifying according to the first unlocking manner comprises: the electronic equipment is internally provided with a fingerprint identifier and a finger pressure sensor, when a user places a finger on the fingerprint identifier, the fingerprint identifier collects and identifies fingerprint information of the finger, compares the fingerprint information with a preset fingerprint in a preset database, and transmits a fingerprint result to a judgment module in the electronic equipment; the method comprises the steps that when a user places a finger on a fingerprint recognizer, other fingers are placed on a finger pressure sensor on a screen of the electronic equipment, the finger pressure sensor collects pressure applied by other fingers, the number of dot matrixes with pressure values larger than a second threshold value in the contact area of the finger and the screen is judged, the touch area with the applied pressure meeting requirements is calculated according to the number of the dot matrixes with the applied pressure larger than the second threshold value, whether the touch area with the applied pressure meeting requirements of the user falls into the limited preset touch area range or not is judged according to the preset touch area range limited between a third threshold value and a fourth threshold value in a historical record database, and the result of whether the touch area falls into the limited preset touch area range or not is transmitted to a judging module in the; the judging module judges whether the fingerprint passes the verification or not according to the fingerprint result and the result of whether the fingerprint falls into the limited preset touch area range, when the fingerprint is matched with the preset fingerprint in the preset database and the touch area of which the pressure applied by the user meets the requirement falls into the limited preset touch area range, the judging module outputs the result of passing the verification to the unlocking module of the electronic equipment, otherwise, the judging module outputs the result of failing the verification to the unlocking module of the electronic equipment; in the judgment of whether the fingerprint is matched with the preset fingerprint in the preset database or not, whether the similarity ratio of the fingerprint to the preset fingerprint in the preset database is greater than a fifth threshold value or not needs to be judged, if so, the matching relationship exists, and otherwise, the matching relationship does not exist; in each verification, when the touch area with the pressure applied by the user meeting the requirement falls into a preset touch area range defined between a third threshold and a fourth threshold, after the verification, inputting the numerical value of the touch area with the pressure applied by the user meeting the requirement into a historical record database, averaging the numerical value with N records of the touch area in the historical record, and selecting the range of positive and negative certain proportion (+ -M%) of the average result as a new third threshold and a new fourth threshold, so that fine adjustment can be performed according to the use habits of the user, the unlocking flexibility and the user experience are improved, and the information safety of the electronic equipment is ensured.
According to an exemplary embodiment of the present invention, the second unlocking manner is a biometric input, wherein in step 4, the user inputting and verifying according to the second unlocking manner includes: the electronic equipment is provided with an ambient light judging module, an eye judging module and a motion sensing module containing a gravity sensor; when entering a second unlocking mode, the ambient light judgment module judges the intensity of ambient light, if the intensity of the ambient light meets the strong ambient cursor criterion, the eye judgment module is started, and if the intensity of the ambient light meets the weak ambient cursor criterion, the motion sensing module is started, and the started selection mode is displayed on the display screen; the eye judgment module shoots a video of eye movement changes of a user through a lens of the camera, analyzes the positions of eyeballs in each frame in the video, comprehensively judges the movement changes of the eyes of the user, compares the movement change tracks of the eyes of the user with records in the eye judgment module, unlocks a screen when the matching degree is determined to meet the requirement, and informs the user of unlocking failure when the matching degree is determined not to meet the requirement. The shooting and analyzing operation is as follows: when the screen displays the eye judgment module, the image or the text on the screen prompts a user to watch a front camera of the electronic equipment and enable eyeballs to move in a specified time period, the specified distance range is kept between the image or the text and the front camera, the palm is kept to hold the electronic equipment and not shake, the distance can ensure that the camera can capture the movement of the eyeballs of the user, meanwhile, the camera starts a shooting mode, a plurality of frames in the shot video are obtained in the specified time period, the eye part is locked by analyzing a region with large gray scale change in each frame of image, the eye part is specifically scanned in the horizontal direction and the vertical direction in sequence, when the gray scale change in two adjacent pixels is judged to be larger than a seventh threshold value, the rest pixel sequences in the direction are calculated, the change of the gray scale value is drawn into a curve, when the maximum value appears, the junction of a sclera and an iris is reached, when the minimum, when the second maximum value appears, indicating that the boundary of the iris and the sclera is reached, the same operation is carried out to capture the position information and the coordinate value of the other eye in the frame image; then sequentially analyzing the positions of two pupils in adjacent frames, and drawing a moving curve of the eyes of the user according to the coordinate numerical value of each pupil in each frame of image; and comparing the drawn binocular curve with the record in the eye judgment module, and unlocking the screen when the matching degree of at least one of the two eyes and the record meets the requirement. For example, when a user registers a "√" shaped unlock code in a record in advance, the degree of matching of the drawn movement curve of at least one of the two eyes and the record is satisfactory, which indicates that the user is the owner. In addition, if the weak environment cursor criterion is met, the motion sensing module is started, the started selection mode is displayed on the display screen, a user is reminded to hold the electronic equipment and shake the electronic equipment in a certain track within a specified time period, a gravity sensor in the motion sensing module in the electronic equipment draws an acceleration change curve through the motion sensing module according to the change of the acceleration of the electronic equipment within the specified time period, the acceleration change curve is compared with records in the motion sensing module, and the screen is unlocked when the matching degree of the acceleration change curve and one of the recorded acceleration change curves is determined to meet the requirement. For example, when the user registers an "N" shaped unlock password in the record in advance, when the estimation that the user holds the electronic device and moves within a specified time period is also N, and the matching degree of the acceleration change curve and the recorded acceleration change curve meets the requirement, it is indicated that the user is the owner.
According to an exemplary embodiment of the present invention, step 5 further comprises: if the number of times of failure of the second unlocking mode of the user reaches a first threshold value, the unlocking is suspended for a time period T, after the time period T, if the user still tries to unlock through the second unlocking mode, after the total number of times of failure of unlocking of the second mode of the user reaches a sixth threshold value which is larger than the first threshold value, one of the following modes is selected: prolonging a pause unlocking time period T ', wherein T' > T; and starting a third unlocking mode, wherein the third unlocking mode is any one of password input, sliding input, biological feature recognition input and action input, and if the failure times of the third unlocking mode reach a sixth threshold value, the unlocking module sends a failure signal to the electronic equipment processor to shut down the electronic equipment processor. Before shutdown, when the number of times of unlocking failure reaches a first threshold or a sixth threshold, the user attempting unlocking is a non-owner or an owner with changed biometric information, at the moment, in order to guarantee information safety, an image of the user failing to unlock is shot through a camera lens of the electronic equipment, and the image is sent to a preset destination and/or displayed on a screen; wherein the operation of sending to the predetermined destination is: the owner associates, matches and sets an unlocking module with a social application program, a global positioning system application program and an application program for starting mobile communication in advance, when the unlocking fails for a certain number of times, the unlocking module starts the global positioning system application program and the application program for starting mobile communication, inquires preset contacts in the application program by searching widgets (widgets) on a desktop of the electronic equipment and starting the social application program, transmits the shot current image of the user with the unlocking failure to the preset contacts, and transmits the positioning of the geographic coordinates of the electronic equipment to the preset contacts through the social application program and a mobile network, so that the preset contacts acquire the position of the electronic equipment and the information of the people trying to unlock; further, in order to prompt the person who attempts to unlock to return the electronic device, the screen of the electronic device also displays an image of the user who has failed in the captured unlocking, and displays the contact address of the owner or the contact addresses of their relatives and friends. With this arrangement, the security of information of the electronic device can be effectively promoted.
Preferably, the owner of the electronic device associates, matches and sets the unlocking module with a social application such as WeChat, a positioning program and a wireless network starting program in advance, when the unlocking fails for a certain number of times, the unlocking module starts a global positioning system application program and an application program for starting mobile communication, inquires a preset contact (for example, "koala kogaku") in the application, transmits the shot current image of the user with the failed unlocking to kogaku, and sends the location of the geographic coordinates of the electronic device (for example, "location" in the social application such as WeChat ") to kogaku (for example," send location "function or" real-time shared location "function in" location "function in the social application such as WeChat koku) via the wireless network and the positioning program through the social application such as WeChat koku, enabling the kohlrabi to acquire the position of the electronic equipment and information of a person attempting to unlock; in addition, in order to prompt the person who attempts to unlock to return the electronic device, the screen of the electronic device also displays the image of the user who has failed in unlocking and displays the contact address of the owner or the contact addresses of the relatives and friends of the owner; preferably, after the function of "sharing a real-time location" in the "location" in the social application such as WeChat is started, the activated state of the function is maintained, and a preset contact person is waited to perform location positioning of the electronic device according to the location information or search the electronic device accordingly, so that the electronic device can be guaranteed to be returned or found as soon as possible, and loss caused by information leakage is reduced.
According to an exemplary embodiment of the present invention, in step 8, the simple transformation is: the user stays a finger at a certain position (such as chat records, short message information and pictures) in the application program in a window presented by the application program for a certain time, then the touch screen is kept to move upwards or downwards, the window of the application program is pulled up or pulled down, when the position which the user desires to store is reached, the finger of the user stays at another position (such as another chat record, another short message information and another picture) in the application program for a certain time, and when the finger of the user is removed from the touch screen, the information from the certain position to the another position is selected. Then the transformation module converts the selected information into a picture format in a screenshot mode and executes the following operations: calculating pixels of the picture to obtain u × v pixels, dividing the picture into P image tiles (tiles) which are not overlapped with each other, arranging pixel values of the image tiles in sequence from few to many to obtain a sequence tile1, tile2, … … and tile of the image tiles, and taking a middle value in the sequence to obtain a median image tile of the sequence, wherein when w is an even number, an image tile with a sequence number of half of a w value is taken as a median image tile, and when w is an odd number, an image tile with a sequence number of an integer part of half of the w value is taken as a median image tile; calculating w-1 number differences of pixels of the median image tile and other image tiles in the sequence; the difference in the number of pixels of the median image tile and each image tile is then modified to generate an offset: wherein the difference in the number of pixels of the median image tile and the image tile is incremented by one when the difference in the number is greater than an eighth threshold which is a positive integer, and decremented by one when the difference in the number is less than the inverse of the eighth threshold which is a positive integer, and the difference in the number of pixels of the median image tile and the image tile is unchanged when the difference in the number is between the eighth threshold and its inverse, including between the two endpoints; and then traversing the number difference of each corresponding pixel in the image tiles, modifying the offset generated according to the number difference of the pixels of the median image tile and each image tile, inserting a binary password bit into a vacancy formed by the offset, and inserting an offset identifier between the image tiles, thereby realizing format conversion of the content to be stored for peeping prevention and leakage prevention, further storing the content into a specified area of the electronic equipment, and displaying an icon above a screen to prompt that the content stored for peeping prevention and leakage prevention exists when the context information of the content is displayed.
In the process that information from one position to another position is selected, the pressure sensor judges the selected position, when effective pressure is detected to stay at one position on the touch screen, a trigger signal is sent to the timing module and timing is started, when the pressure range is detected to move, timing is stopped, and the same operation is executed at another position; a selected procedure that is considered valid only if the timer determines that the time period at both locations exceeds a predetermined requirement; wherein the step of determining to make a selection at a location is: dividing the information of the application program into different parts according to a preset unit (for example, according to each chat record, each short message and each picture), taking a center line between the part and the previous part as an upper boundary of the part, taking a center line between the part and the next part as a lower boundary of the part, and taking the upper boundary, the lower boundary and a rectangular area between the left side and the right side of the screen as an area of the part; when the user touches with a finger, the pressure sensor firstly judges an effective touch range with a pressure value meeting the requirement, calculates the number of pixels of the effective touch range in different parts and the proportion thereof, determines a part as a selected part when the effective touch range is completely positioned in the part, determines a part with the proportion more than half as the selected part when the effective touch range crosses a midline touch, prompts the user to reselect on a screen when the effective touch range crosses the midline touch range, and repeatedly executes the above operations to determine the selected part.
According to an exemplary embodiment of the present invention, the cryptographic transformation comprises the steps of: the user stays a finger at a certain position (such as a chat record, short message information and a picture) in the application program for a certain time in a window presented by the application program, then the finger is removed from the touch screen, the window of the application program is pulled up or pulled down by pulling the scroll bar within another specified time, when the position which the user desires to store is reached, the finger of the user stays at another position (such as another chat record, another short message information and another picture) in the application program for a certain time, and when the finger of the user is removed from the touch screen, the information from the certain position to the another position is selected. Then the transformation module converts the selected information into a picture format in a screenshot mode and executes the following operations: decomposing the image, transforming the image into a horizontal component, a vertical component, a diagonal component, and other components using wavelet transformation, and storing the other components and the diagonal component to a designated area of the electronic device, storing the horizontal component and the vertical component to a remote device; wherein storing to the remote device comprises: inserting a key input by a user between the horizontal component and the vertical component, thereby generating a first data sequence; sending the first data sequence to a remote device such as a cloud server, so that the remote device performs first verification according to the first data sequence and forms a verification code; and receiving the verification code returned by the remote equipment, and storing the verification code in the specified area of the electronic equipment for use in subsequent calling. Therefore, the safety of information in the electronic equipment can be ensured, and the data information can be ensured to be incomplete after the electronic equipment is lost or is cracked, unlocked and entered into the application program by a non-owner, so that the cracked and entered person can not restore the part of data, and the information is ensured not to be leaked; meanwhile, all the contents to be stored for peeping prevention and leakage prevention are not required to be encrypted, so that the data processing efficiency can be effectively improved, and the user experience is improved.
According to an exemplary embodiment of the invention, in step 10, when the user clicks an icon to attempt display, the application prompts the user to enter a password, after authentication, the application initiates mobile network communication, calls stored peep-proof and leak-proof content from a designated area of the electronic device or a designated area of the electronic device and a remote device, enters a binary password bit when stored for simple transformation, and removes the binary password bit from the stored content, extracts individual image tiles according to offset identification at division, arranges in order from as few as many as possible, generates a difference in the number of pixels of the image tiles, and traverses each image tile, reduces the difference in the number when the difference in the number of pixels of the medium image tile and each image tile is greater than an eighth threshold value, reduces the difference in the number when the difference in the number of pixels of the medium image tile and each image tile is less than the inverse number of the eighth threshold value plus one, adding one to the number difference, the number difference between the median image tile and the number of pixels of the image tile being constant when the number difference is between the eighth threshold and its inverse, including between the two endpoints; therefore, reverse offset of the image tiles of the image is realized, and stored peep-proof and leakage-proof contents are restored through splicing the image tiles; when the verification code is stored after encryption transformation, the verification code is called from the designated area of the electronic equipment and is sent to the remote equipment, the remote equipment restores the verification code to form a first data sequence and sends the first data sequence back, the verification code is restored to a horizontal component and a vertical component based on a secret key input by a user, and the original image is obtained through inverse transformation by combining other components and diagonal components stored in the designated area.
Fig. 2 illustrates a block diagram of an information security management system according to an exemplary embodiment of the present invention. The information security management system comprises a memory, a processor, an application program, a fingerprint recognizer, a determination module, a finger pressure sensor, an unlocking module, an ambient light determination module, an eye determination module, a motion sensing module, a gravity sensor, a camera, a lens, a social application program, a transformation module, a global positioning system program module, an application program for starting mobile communication and a timing module, wherein the memory comprises a program for executing the information security management method, and the processor calls the program in the memory to be connected with the application program, the fingerprint recognizer, the determination module, the finger pressure sensor, the unlocking module, the ambient light determination module, the eye determination module, the motion sensing module, the gravity sensor, the camera, the lens, the social application program, the transformation module, the global positioning system program module, the application program for starting mobile communication, the camera, the social application program, the, The timing module together performs one or more of the steps of the above-described information security management method.
The above-mentioned technical terms are conventional technical terms having ordinary meanings in the art, and are not further explained herein in order not to obscure the point of the present invention.
In summary, in the technical solution of the present invention, by using an information security management method, information setting and scientific management can be performed on electronic devices, so that information security of an owner is better protected, and leakage of personal information, privacy information, information of relatives and friends, and contact data is avoided; and facilitate the electronic device being returned after being lost; parameters can be dynamically fine-tuned according to the use habits of users, and the unlocking flexibility and the user experience are improved; the method can ensure that the crack entrants cannot restore the stored data, effectively improve the data processing efficiency and improve the user experience.
It will be understood that: the examples and embodiments of the invention may be implemented in hardware, software, or a combination of hardware and software. As mentioned above, any body performing this method may be stored, for example, in the form of volatile or non-volatile storage, for example, a storage device, like a ROM, whether erasable or rewritable or not, or in the form of memory, such as for example a RAM, a memory chip, a device or an integrated circuit, or on an optically or magnetically readable medium, such as for example a CD, a DVD, a magnetic disk or a magnetic tape. It will be understood that: storage devices and storage media are examples of machine-readable storage suitable for storing one or more programs that, when executed, implement examples of the present invention. Examples of the present invention may be conveyed electronically via any medium, such as a communications signal carried by a wired or wireless coupling, and the examples contain the same where appropriate.
It should be noted that: the invention can set and scientifically manage the information of the electronic equipment, thereby better protecting the information security of the owner and avoiding the leakage of personal information, privacy information, friend and relatives information and contact data; and facilitate the electronic device being returned after being lost; parameters can be dynamically fine-tuned according to the use habits of users, and the unlocking flexibility and the user experience are improved; the technical means that a crack entrant cannot restore stored data, the data processing efficiency is effectively improved, the technical problem of user experience is improved, the technical means that technicians in the technical field of computers can understand according to the teaching of the specification after reading the specification is adopted, and beneficial technical effects are obtained, so that the scheme claimed in the appended claims belongs to the technical scheme in the meaning of patent law. Furthermore, the solution claimed in the appended claims has utility since it can be manufactured or used in industry.
The above description is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Unless expressly stated otherwise, each feature disclosed is one example only of a generic series of equivalent or similar features. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (7)

1. An information security management method, comprising:
step 1, when the electronic equipment is triggered, displaying a first unlocking mode on a screen;
step 2, the user inputs according to the first unlocking mode, if the verification is passed, the step 7 is carried out, otherwise, the step 3 is carried out;
step 3, displaying a second unlocking mode on a screen;
step 4, the user inputs according to the second unlocking mode, if the verification is passed, the step 7 is carried out, otherwise, the step 5 is carried out;
step 5, repeating the step 4, and if the failure times of the second unlocking mode of the user reach a first threshold value, pausing the unlocking for a period of time;
step 6, when the application program related to privacy in the electronic equipment is started after the user verification is passed, the application program presents the content;
and 7: the user selects and sets the contents which need to be stored for peeping and leakage prevention, and selects the contents which are stored after simple transformation or encrypted transformation;
and 8: if the content is stored after simple conversion, performing format conversion on the content to be stored for peeping prevention and leakage prevention and storing the content, displaying an icon above a screen to prompt that the content stored for peeping prevention and leakage prevention exists when the context information of the content is displayed, and executing the step 10;
step 9, if the content is stored after encryption conversion, performing format conversion on the content to be stored for peep prevention and leakage prevention, displaying an icon above a screen to prompt that the content stored for peep prevention and leakage prevention exists when the context information of the content is displayed, and executing step 10; and
step 10, when the user clicks the icon to try to display, the application program reminds the user to input a password, and after the password is verified, the application program calls the content stored for peeping and leakage prevention so as to display the content on a screen;
the first unlocking mode is biological characteristic identification input, wherein in the step 2, the step of inputting and verifying by the user according to the first unlocking mode comprises the following steps: the electronic equipment is internally provided with a fingerprint identifier and a finger pressure sensor, when a user places a finger on the fingerprint identifier, the fingerprint identifier collects and identifies fingerprint information of the user, compares the fingerprint information with a preset fingerprint in a preset database, and transmits a fingerprint comparison result to a judgment module in the electronic equipment; the method comprises the steps that when a user places a finger on a fingerprint recognizer, other fingers are placed on a finger pressure sensor on a screen of the electronic equipment, the finger pressure sensor collects pressure applied by other fingers, the number of dot matrixes with pressure values larger than a second threshold value in the contact area of the finger and the screen is judged, the touch area with the applied pressure meeting requirements is calculated according to the number of the dot matrixes with the applied pressure larger than the second threshold value, whether the touch area with the applied pressure meeting requirements of the user falls into the limited preset touch area range or not is judged according to the preset touch area range limited between a third threshold value and a fourth threshold value in a historical record database, and the result of whether the touch area falls into the limited preset touch area range or not is transmitted to a judging module in the; the judging module judges whether the fingerprint passes the verification or not according to the fingerprint comparison result and the result of whether the fingerprint falls into the limited preset touch area range, when the fingerprint is matched with the preset fingerprint in the preset database and the touch area of which the pressure applied by the user meets the requirement falls into the limited preset touch area range, the judging module outputs the result of passing the verification to an unlocking module of the electronic equipment, otherwise, the judging module outputs the result of failing the verification to the unlocking module of the electronic equipment; in the judgment of whether the fingerprint is matched with the preset fingerprint in the preset database or not, whether the similarity ratio of the fingerprint to the preset fingerprint in the preset database is greater than a fifth threshold value or not needs to be judged, if so, the matching relationship exists, and otherwise, the matching relationship does not exist; in each verification, when the touch area with the pressure applied by the user meeting the requirement falls into a preset touch area range defined between a third threshold and a fourth threshold, after the verification, inputting the numerical value of the touch area with the pressure applied by the user meeting the requirement into a historical record database, averaging the numerical value with N records of the touch area in the historical record, and selecting a range with a certain proportion of positive and negative of an averaging result as a new third threshold and a new fourth threshold, so that fine adjustment can be performed according to the use habits of the user, the unlocking flexibility and the user experience are improved, and the information safety of the electronic equipment is ensured;
in step 4, the user inputting and verifying according to the second unlocking mode includes: the electronic equipment is provided with an ambient light judging module, an eye judging module and a motion sensing module containing a gravity sensor; when entering a second unlocking mode, the ambient light judgment module judges the intensity of ambient light, if the intensity of the ambient light meets the strong ambient cursor criterion, the eye judgment module is started, and if the intensity of the ambient light meets the weak ambient cursor criterion, the motion sensing module is started, and the started selection mode is displayed on the display screen; the eye judgment module shoots a video of eye movement changes of a user through a lens of the camera, analyzes the positions of eyeballs in each frame in the video, comprehensively judges the movement changes of the eyes of the user, compares the movement change tracks of the eyes of the user with records in the eye judgment module, unlocks a screen when the matching degree is determined to meet the requirement, and informs the user of unlocking failure when the matching degree is determined not to meet the requirement; the shooting and analyzing operation is as follows: when the screen displays the eye judgment module, the image or the text on the screen prompts a user to watch a front camera of the electronic equipment and enable eyeballs to move in a specified time period, the specified distance range is kept with the front camera, the palm is kept to hold the electronic equipment and the electronic equipment is not shaken, the distance range can ensure that the camera can capture the movement of the eyeballs of the user, meanwhile, the camera starts a shooting mode, a plurality of frames in a shot video are obtained in the specified time period, the eye part is locked by analyzing a region with large gray scale change in each frame of image, the eye part is specifically scanned in the horizontal direction and the vertical direction in sequence, when the gray scale change in two adjacent pixels is judged to be larger than a seventh threshold value, the rest pixel sequences in the direction are calculated, the change of the gray scale value is drawn into a curve, when the maximum value appears, the junction of a sclera and an iris is reached, when the minimum value, when the second maximum value appears, indicating that the boundary of the iris and the sclera is reached, the same operation is carried out to capture the position information and the coordinate value of the other eye in the frame image; then sequentially analyzing the positions of two pupils in adjacent frames, and drawing a moving curve of the eyes of the user according to the coordinate numerical value of each pupil in each frame of image; comparing the drawn movement curves of the two eyes with records in the eye judgment module, and unlocking the screen when the matching degree of at least one of the movement curves of the two eyes with the records meets the requirement; and if the weak environment cursor criterion is met, starting the motion sensing module, displaying the started selection mode on a display screen, reminding a user to hold the electronic equipment and shake the electronic equipment in a certain track within a specified time period, drawing an acceleration change curve by the motion sensing module according to the change of the acceleration of the electronic equipment within the specified time period by a gravity sensor in the motion sensing module in the electronic equipment, comparing the acceleration change curve with the record in the motion sensing module, and unlocking the screen when the matching degree of the acceleration change curve and one of the recorded acceleration change curves is determined to meet the requirement.
2. The information security management method according to claim 1, wherein:
in step 5, repeating step 4, if the number of times of the second unlocking mode failure of the user reaches a first threshold value, pausing unlocking for a period of time, shooting an image of the user with the failed unlocking through a camera lens of the electronic equipment, and sending the image of the user to a preset destination and/or displaying the image on a screen.
3. The information security management method according to claim 2, wherein:
in step 8, if the content is stored after simple transformation, the content to be stored for peep prevention and leakage prevention is subjected to format transformation and stored in a designated area of the electronic device.
4. The information security management method according to claim 3, wherein:
in step 9, if the content is stored after encryption transformation, the content to be stored for peep prevention and leakage prevention is subjected to format transformation, part of the content is stored in a designated area of the electronic device, and the other part of the content is stored in a remote device.
5. The information security management method according to claim 4, wherein:
in step 10, when the user clicks on the icon to attempt display, the application prompts the user to enter a password, and after verification, the stored peek-and-leak-protected content is invoked from the designated area of the electronic device or the designated area of the electronic device and the remote device for display on the screen.
6. The information security management method according to claim 5, wherein:
in step 10, when the user exits the application or browses other applications, the retrieved stored peek-protected and revealed content is deleted from the buffer, while being guaranteed to be stored only on the designated area of the electronic device or on the designated area of the electronic device and the remote device.
7. An information security management system is applied to electronic equipment and comprises a memory, a processor, an application program, a fingerprint recognizer, a judging module, a finger pressure sensor, an unlocking module, an ambient light judging module, an eye judging module, a motion sensing module, a gravity sensor, a camera, a lens, a social application program, a transformation module, a global positioning system application program, an application program for starting mobile communication and a timing module, wherein the processor calls the program in the memory to be connected with the application program, the fingerprint recognizer, the judging module, the finger pressure sensor, the unlocking module, the ambient light judging module, the eye judging module, the motion sensing module, the gravity sensor, the camera, the lens, the social application program, the transformation module, the global positioning system application program, the application program for starting mobile communication, the camera, the eye judging module and the mobile communication, The timing modules together perform the information security management method of any one of claims 1-6.
CN201811590510.3A 2018-12-25 2018-12-25 Information security management method and system Active CN109543390B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811590510.3A CN109543390B (en) 2018-12-25 2018-12-25 Information security management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811590510.3A CN109543390B (en) 2018-12-25 2018-12-25 Information security management method and system

Publications (2)

Publication Number Publication Date
CN109543390A CN109543390A (en) 2019-03-29
CN109543390B true CN109543390B (en) 2020-08-14

Family

ID=65858093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811590510.3A Active CN109543390B (en) 2018-12-25 2018-12-25 Information security management method and system

Country Status (1)

Country Link
CN (1) CN109543390B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287677B (en) * 2019-06-28 2021-09-24 Oppo广东移动通信有限公司 Control method of application program, electronic device and readable storage medium
CN112307452A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 Application program operation control method and device and computer readable storage medium
CN110881033B (en) * 2019-11-07 2022-06-21 腾讯科技(深圳)有限公司 Data encryption method, device, equipment and readable storage medium
CN112989292A (en) * 2019-12-17 2021-06-18 中移(成都)信息通信科技有限公司 Interface display method, device and medium
CN113095843A (en) * 2021-05-08 2021-07-09 中国工商银行股份有限公司 User authentication method, user authentication device, user authentication system, and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104966009A (en) * 2015-06-12 2015-10-07 联想(北京)有限公司 Information processing method and electronic equipment
CN105094443A (en) * 2015-08-21 2015-11-25 深圳市汇顶科技股份有限公司 Touch pressure detecting device and method
CN105530356B (en) * 2015-12-21 2018-06-01 珠海格力电器股份有限公司 Communication terminal and its data guard method and device
CN105844241A (en) * 2016-03-23 2016-08-10 深圳市金立通信设备有限公司 Method and terminal for detecting touch control pressure
CN108076426A (en) * 2017-12-11 2018-05-25 广东欧珀移动通信有限公司 Terminal tracing method, apparatus, storage medium and terminal device
CN108289141A (en) * 2017-12-27 2018-07-17 努比亚技术有限公司 A kind of the screen locking unlocking method and mobile terminal of mobile terminal

Also Published As

Publication number Publication date
CN109543390A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
CN109543390B (en) Information security management method and system
JP4924603B2 (en) Face authentication device, face authentication method and program
US10671716B2 (en) User authentication method and system using variable keypad and biometric identification
CN110968855B (en) Occlusion detection during a facial recognition process
US8224128B2 (en) Portable information terminal device
CN104376248B (en) A kind of method and device that user's checking is carried out in interface for password input
EP2605167B1 (en) Private/Public Gesture Security system and method of operation thereof
CN108171137B (en) Face recognition method and system
CN104933342A (en) Picture viewing method and mobile terminal
US20140351926A1 (en) Athentication of device users by gaze
WO2021197369A1 (en) Liveness detection method and apparatus, electronic device, and computer readable storage medium
KR101196759B1 (en) Portable terminal and method for changing owner mode automatically thereof
JP2020505705A (en) Method and device for learning feature image and user authentication method
US20090316960A1 (en) Mobile electronic device security protecting system and method
CN109543389B (en) Information protection method and system
CN109951598A (en) Display methods, device, computer equipment and the storage medium of application interface
CN109684810B (en) Information processing method and system
US10764281B1 (en) Systems and methods for authenticating a user using an image capture device
US20210312024A1 (en) Methods and Devices for Operational Access Grants Using Facial Features and Facial Gestures
US20200026866A1 (en) Method and device for covering private data
JP2009156948A (en) Display control device, display control method, and display control program
JP2020004424A (en) Method and device for protecting privacy of mobile terminal and mobile terminal
US11036971B2 (en) Face recognition method and electronic device employing the method
KR100608307B1 (en) The method and system for recognition human face
JP6960058B2 (en) Face matching system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200714

Address after: Room 1, Unit 13-14, Building 1, Zheshang International, Chagu Avenue, Liuwu New District, Lhasa City, Tibet Autonomous Region, 850000

Applicant after: Jinrun Ark Technology Co.,Ltd.

Address before: 510000 A30 house 68 (1), Nanxiang Road, Whampoa District, Guangzhou, Guangdong.

Applicant before: GUANGZHOU ZHIHONG TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant